Vulnhub – Funbox Rookie
URI: https://www.vulnhub.com/entry/funbox-2-rockie,520/ Difficulty: Easy
Boot2Root ! This can be a real life scenario if rockies becomes admins. Easy going in round about 15 mins. Bit more, if you are find and stuck in the rabbit-hole first.
enumeration
- nmap
- find anon ftp access
- get all zip files – they contain
id_rsakeys but are password protected
initial access
- use
/usr/sbin/zip2johnto get hashes of all zip files - use
johnto crack these hashes using your favourite wordlist - user tom's zip file could be successfully cracked
- extract
id_rsawith password chmod 600 id_rsa && ssh -i id_rsa $VulnHubIP -v- we're in 🔓
- grab
local.txt
privesc
sudo -l– prompted for tom's password which we don't have yet- check all files in directory
ls -la - investigate
.bash_historyand.mysql_history - looks like we see a password in mysql history
- we have excessive sudo privileges
sudo su -land grabproof.txt🔚